8.5.7 Cloud Concepts and Connectivity

Ace your homework & exams now with Quizwiz!

Which of the following are true regarding cloud computing? (Select three.)

Cloud computing consists of software, data access, computation, and storage services provided to clients through the internet. The term cloud is used as a synonym for the internet. Typical cloud computing providers deliver common business applications online. They are accessed from another web service or software, like a web browser.

Which of the following are benefits that a VPN provides? (Select two.)

Cost savings Compatibility Benefits provided by VPNs include the following: Cost savings - VPNs reduce connectivity costs while increasing remote connection bandwidth. Security - by using appropriate encryption and authentication protocols, data being transmitted across the VPN can be secured from prying eyes. Scalability - because VPNs use the internet, you can add additional users without adding significant infrastructure. Compatibility - you can implement VPNs across many different WAN types, including broadband technologies.

IPsec is implemented through two separate protocols. What are these protocols called? (Select two.)

ESP AH IPsec is implemented through two separate protocols, which are called Authentication Header (AH) and Encapsulating Security Payload (ESP). AH provides authentication and non-repudiation services to verify that the sender is genuine and that the data was not modified in transit. ESP provides data encryption services for the data within the packet.

Which other service is IPsec composed of, in addition to AH?

Encapsulating Security Payload (ESP) Psec is composed of two services, which are called Authentication Header (AH) and Encapsulating Security Payload (ESP). AH is primarily used for authenticating the two communication partners in an IPsec link. ESP is primarily used to encrypt and secure the data transferred between IPsec partners. IPsec employs ISAKMP (Internet Security Association and Key Management Protocol) for encryption key management.

You were recently hired by a small startup company. The company is in a small office and has several remote employees. You have been asked to find a business service that can both accommodate the company's current size and scale as the company grows. The service needs to provide adequate storage as well as additional computing power. Which cloud service model should you use?

IaaS EXPLANATION Infrastructure as a Service (IaaS) delivers infrastructure to the client, such as processing, storage, networks, and virtualized environments. The client deploys and runs software without purchasing servers, data center space, or network equipment.

Match each description on the left with the appropriate cloud technology on the right.

Public cloud: Provides cloud services to just about anyone Private cloud: Provides cloud services to a single organization Community cloud: Allows cloud services to be shared by several organizations. Hybrid cloud: Integrates one cloud service with other cloud services

Which of the following cloud computing solutions delivers software applications to a client either over the internet or on a local area network?

SaaS Software as a Service (SaaS) delivers software applications to the client either over the internet or on a local area network.

Which of the following provides a VPN gateway that encapsulates and encrypts outbound traffic from a site and sends the traffic through a VPN tunnel to the VPN gateway at the target site?

Site-to-site IPsec VPN Site-to-site IPsec VPNs connect networks across an untrusted network, such as the internet. The VPN gateway encapsulates and encrypts outbound traffic from a site and sends the traffic through a VPN tunnel to the VPN gateway at the target site. Clients send and receive normal unencrypted TCP/IP traffic through a VPN gateway. The receiving VPN gateway strips the headers, decrypts the content, and relays the packet toward the target host inside its private network.

What is a VPN (virtual private network) primarily used for?

Support secure communications over an untrusted network. A VPN (virtual private network) is primarily used to support secure communications over an untrusted network. You can use a VPN over a local area network, across a WAN connection, over the internet, and even between a client and a server over a dial-up internet connection.

Which of the following are IPsec modes of operation? (Select two.)

Tunnel mode Transport mode Tunnel mode and transport mode are the two IPsec modes of operation


Related study sets

American History 1 Online Mitchell CC Quizzes

View Set

Chapter 09 Quiz: Finance: Acquiring and Using Funds to Maximize Value

View Set

Newton's Second Law Physics Quiz retake

View Set

sociology test chp. 4, sociology test chp. 5, sociology test chp. 6

View Set